Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:0858 - Security Advisory
Issued:
2023-02-21
Updated:
2023-02-21

RHSA-2023:0858 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
  • kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2067482 - CVE-2022-2964 kernel: memory corruption in AX88179_178A based USB ethernet device.
  • BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
  • BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces

CVEs

  • CVE-2022-2964
  • CVE-2022-3564
  • CVE-2022-4378

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_70_1-1-3.el8_1.src.rpm SHA-256: bba3b6307debfc997df11410e0c830141425a2d5f93652234ee1ba855acba211
kpatch-patch-4_18_0-147_74_1-1-3.el8_1.src.rpm SHA-256: 7e053056415ff0cddf9cf796ca8129d5a4ce00472d20f962df0d0788079fbe32
kpatch-patch-4_18_0-147_76_1-1-2.el8_1.src.rpm SHA-256: e318f7e177af4cb72c15cc97102e691d0dc38156d1fc93455097d51fcda25d62
kpatch-patch-4_18_0-147_77_1-1-2.el8_1.src.rpm SHA-256: ad5a343a41303044eb784ea2e0959de0a1196d8cbf7efb348958ef21ab4c4bd8
kpatch-patch-4_18_0-147_78_1-1-1.el8_1.src.rpm SHA-256: 0cfbafcc8fc9d138ad11446e9f0f446147ac5e9ee06a472bd4d889c1c78385a8
ppc64le
kpatch-patch-4_18_0-147_70_1-1-3.el8_1.ppc64le.rpm SHA-256: 2d8057b4add2a4991bbb4e271bf13bbaaf3a964b47cc3fa11834ac2a0626a63c
kpatch-patch-4_18_0-147_70_1-debuginfo-1-3.el8_1.ppc64le.rpm SHA-256: e964a3b3e8f281773bc7c5937d97216ca1d5b2bbbb862468331492281e94114f
kpatch-patch-4_18_0-147_70_1-debugsource-1-3.el8_1.ppc64le.rpm SHA-256: 2f619d69d055e67e12ca365e2cd3559fd5d9c63eb08cd898407dfe011d3aa6c2
kpatch-patch-4_18_0-147_74_1-1-3.el8_1.ppc64le.rpm SHA-256: 55fa7791f382949d0a439ae3be95cab73ff520c50ec3435fe13c96969c809ff2
kpatch-patch-4_18_0-147_74_1-debuginfo-1-3.el8_1.ppc64le.rpm SHA-256: 075951980e2cc46da8e31acec572d87db640cd6f491500757d6bd08744097af1
kpatch-patch-4_18_0-147_74_1-debugsource-1-3.el8_1.ppc64le.rpm SHA-256: c53b5459a19eb5d3648bc8df75584d76ce01d1f2c31a9e15cbf519f812252753
kpatch-patch-4_18_0-147_76_1-1-2.el8_1.ppc64le.rpm SHA-256: 42d74fed8fb5ef5839a09c70b4ef27fe3381daa33b49b419562e9cfea4c091e6
kpatch-patch-4_18_0-147_76_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 05652ea41ceb01ed3aa03e230830a7927b788845d4266ffba1f9ed205348ca14
kpatch-patch-4_18_0-147_76_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: c5d8e982a49e41f8d4a4d2f9c00388fa41a00e5c59c26c7d8963adb097037c97
kpatch-patch-4_18_0-147_77_1-1-2.el8_1.ppc64le.rpm SHA-256: 2eb59ad5111c62838fa545ef87d7ed4f6857fc32cd9e288b24fe054e2c047a1b
kpatch-patch-4_18_0-147_77_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 729f82bd4d560ad89128bf63dce2b62b803f730abdaa8da74808d9d43adc2968
kpatch-patch-4_18_0-147_77_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: ed6d0b10a1a8be4b5c3a7a0d4afefe33a7a39a4d973d804813d119f52dabf41f
kpatch-patch-4_18_0-147_78_1-1-1.el8_1.ppc64le.rpm SHA-256: b489aa28f3b3018af3a70fd7bf718baf2c8266f89950076999fef7829959c9d0
kpatch-patch-4_18_0-147_78_1-debuginfo-1-1.el8_1.ppc64le.rpm SHA-256: 88cc6c303011fb5fb62004b512aac44d3e5da0b4923c8aff62fd5ecbf82264dd
kpatch-patch-4_18_0-147_78_1-debugsource-1-1.el8_1.ppc64le.rpm SHA-256: 806b42a2e56b326aed71cb543b5062d9a4984a2de6a5cc9c94c3799a74af55de

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_70_1-1-3.el8_1.src.rpm SHA-256: bba3b6307debfc997df11410e0c830141425a2d5f93652234ee1ba855acba211
kpatch-patch-4_18_0-147_74_1-1-3.el8_1.src.rpm SHA-256: 7e053056415ff0cddf9cf796ca8129d5a4ce00472d20f962df0d0788079fbe32
kpatch-patch-4_18_0-147_76_1-1-2.el8_1.src.rpm SHA-256: e318f7e177af4cb72c15cc97102e691d0dc38156d1fc93455097d51fcda25d62
kpatch-patch-4_18_0-147_77_1-1-2.el8_1.src.rpm SHA-256: ad5a343a41303044eb784ea2e0959de0a1196d8cbf7efb348958ef21ab4c4bd8
kpatch-patch-4_18_0-147_78_1-1-1.el8_1.src.rpm SHA-256: 0cfbafcc8fc9d138ad11446e9f0f446147ac5e9ee06a472bd4d889c1c78385a8
x86_64
kpatch-patch-4_18_0-147_70_1-1-3.el8_1.x86_64.rpm SHA-256: d16474d416a648c24728cae2912af2823c5ed3b3130e32ae8ea0ca53297b4d4e
kpatch-patch-4_18_0-147_70_1-debuginfo-1-3.el8_1.x86_64.rpm SHA-256: 16b2037275b18264cb54ae558e3250d20599ffaa3ba9bb40c78365cc5019e740
kpatch-patch-4_18_0-147_70_1-debugsource-1-3.el8_1.x86_64.rpm SHA-256: 7c6d5b81cafe9845a734b406f75172e1b56f041ebb8ce8cc33d73ce563e01658
kpatch-patch-4_18_0-147_74_1-1-3.el8_1.x86_64.rpm SHA-256: 2587f4da854c1426cd8622dce8e1a0e257d072d6bafd94e0e318033ce8d853db
kpatch-patch-4_18_0-147_74_1-debuginfo-1-3.el8_1.x86_64.rpm SHA-256: 0eef73f484c96cff148aebdde1377aa7ec40d5da9f4728a5cc0d2e05194fc077
kpatch-patch-4_18_0-147_74_1-debugsource-1-3.el8_1.x86_64.rpm SHA-256: ca84cf70c44762a426bbef2819ec781d9126834ea2146b184c950ae34f8ed4b6
kpatch-patch-4_18_0-147_76_1-1-2.el8_1.x86_64.rpm SHA-256: 92bac9373b2d01987600d889b6686fe1acc48905701021f03bf1a2cd61f7c0b7
kpatch-patch-4_18_0-147_76_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: ffd040b473d3e245853ea4a58fb60174e037b6bc2c4103ead1274b021795f490
kpatch-patch-4_18_0-147_76_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: f23ede02012a6c726a52600603c5404840acc6b7ad08aebca863aab69d9a54cd
kpatch-patch-4_18_0-147_77_1-1-2.el8_1.x86_64.rpm SHA-256: 318e2295c29fe3d20f7988d8c8e856fae2dff1229a971bed8a69cd61c1072191
kpatch-patch-4_18_0-147_77_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: 22cc0860f35f13883d7ff4d7a8673e5143f04f4dd82363c888f76f09b3427cb5
kpatch-patch-4_18_0-147_77_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: 00551f24f6a975ddb180386f3495fa870d5af8ac0d458bb25086bd165532e0ab
kpatch-patch-4_18_0-147_78_1-1-1.el8_1.x86_64.rpm SHA-256: 4c8fa0c5e530c17726948d8aadff9203b4416f37e4ede7424784cd8a2ae884af
kpatch-patch-4_18_0-147_78_1-debuginfo-1-1.el8_1.x86_64.rpm SHA-256: 92e183c816695915db11301fa472b0fde5d7deae19489ab5497e12ff430094cf
kpatch-patch-4_18_0-147_78_1-debugsource-1-1.el8_1.x86_64.rpm SHA-256: 6505354c8e5117cc4802cda3f67a1fde8803051b6a9ee9e1fa05b53e854275f8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility